An Evaluation on Securing Cloud Systems based on Cryptographic Key Algorithms

被引:2
|
作者
Njuki, Sam [1 ]
Zhang, Jianbiao [1 ]
Too, Edna C. [1 ]
Richard, Rimiru [2 ]
机构
[1] Beijing Univ Technol, Coll Comp Sci & Technol, Beijing, Peoples R China
[2] Jomo Kenyatta Univ Agr & Technol, Sch Comp Sci & IT, Juja, Kenya
基金
高等学校博士学科点专项科研基金; 中国国家自然科学基金;
关键词
Cloud computing; Cloud security; Cryptography; Key management; Virtualization;
D O I
10.1145/3242840.3242853
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
The need for storage and movement of data in today's ever increasing data usage cannot be overemphasized. As a result, storage and movement of data within the cloud becomes a viable option, even though this is a third party and some of the data may be sensitive. Therefore, the security methods in place have to continually be reviewed so as to get the best method or a combination of methods in this ever changing and demanding field. In this paper, the authors have done a formal assessment and examination of cloud systems key cryptographic algorithms and given a recommendation of the best combination of algorithms as a result of our different parameters of considerations. These parameters include whether they are a stream or block cipher and their key size or the hash value. The authors found out that the most viable cryptographic methods for securing the cloud systems are AES, Blowfish, Diffie-Hellman, RSA and SHA-1 which are from symmetric, asymmetric and hashing cryptographic algorithm. They further noted that a hybrid of the three cryptographic algorithms is more effective than an exclusive use of one cryptographic algorithm. They propose a combination of AES, Diffie-Hellman and SHA-1 algorithm for optimum cloud security.
引用
收藏
页码:14 / 20
页数:7
相关论文
共 50 条
  • [11] A Comparative Study of Cryptographic Algorithms for Cloud Security
    Yusufzai, Asifkhan
    Ranpara, Ripal
    Vora, Mital
    Kumbharana, C. K.
    EMERGING TRENDS IN EXPERT APPLICATIONS AND SECURITY, 2019, 841 : 409 - 415
  • [12] PERFORMANCE ANALYSIS OF CRYPTOGRAPHIC ALGORITHMS FOR CLOUD SECURITY
    Vennela, G. Sai
    Varun, N. Venkata
    Neelima, N.
    Priya, L. Sai
    Yeswanth, J.
    PROCEEDINGS OF THE 2018 SECOND INTERNATIONAL CONFERENCE ON INVENTIVE COMMUNICATION AND COMPUTATIONAL TECHNOLOGIES (ICICCT), 2018, : 273 - 279
  • [13] Review Of Some Cryptographic Algorithms In Cloud Computing
    Alharbi, Mawaddah Fouad
    Aldosari, Fahd
    Soh, Ben
    Alharbi, Nawaf Fouad
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2021, 21 (09): : 41 - 50
  • [14] Statistical Evaluation of Cryptographic Algorithms
    Andrasiu, Mircea
    Popescu, Adrian
    Simion, Gheorghe
    PROCEEDINGS OF THE 2010 8TH INTERNATIONAL CONFERENCE ON COMMUNICATIONS (COMM), 2010, : 473 - 476
  • [15] Key Expansion in Cryptographic Systems
    Chitu, Sorin
    Vasile, Daniel Ciprian
    Tramandan, Ionut Daniel
    Svasta, Paul
    2020 IEEE 26TH INTERNATIONAL SYMPOSIUM FOR DESIGN AND TECHNOLOGY IN ELECTRONIC PACKAGING (SIITME 2020), 2020, : 202 - 205
  • [16] Securing Digital Data using 256-bit Multimodal Biometrics based Cryptographic Key
    Arulalan, V.
    Joseph, K. Suresh
    Premanand, V.
    2016 WORLD CONFERENCE ON FUTURISTIC TRENDS IN RESEARCH AND INNOVATION FOR SOCIAL WELFARE (STARTUP CONCLAVE), 2016,
  • [17] Performance Analysis of Symmetric Key Cryptographic Algorithms
    Vyakaranal, Shashidhara
    Kengond, Shivaraj
    PROCEEDINGS OF THE 2018 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATION AND SIGNAL PROCESSING (ICCSP), 2018, : 411 - 415
  • [18] Data security techniques in cloud computing based on machine learning algorithms and cryptographic algorithms: Lightweight algorithms and genetics algorithms
    Thabit, Fursan
    Can, Ozgu
    Wani, Rizwan Uz Zaman
    Qasem, Mohammed Ali
    Thorat, S. B.
    Alkhzaimi, Hoda A. A.
    CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2023, 35 (21):
  • [19] A Survey of Cryptographic Approaches to Securing Big-Data Analytics in the Cloud
    Yakoubov, Sophia
    Gadepally, Vijay
    Schear, Nabil
    Shen, Emily
    Yerukhimovich, Arkady
    2014 IEEE HIGH PERFORMANCE EXTREME COMPUTING CONFERENCE (HPEC), 2014,
  • [20] A MODIFIED CRYPTOGRAPHIC APPROACH FOR SECURING DISTRIBUTED DATA STORAGE IN CLOUD COMPUTING
    Reddy, M. Rajasekhar
    Akilandeswari, R.
    Priyadarshini, S.
    Karthikeyan, B.
    Ponmani, E.
    2017 INTERNATIONAL CONFERENCE ON NETWORKS & ADVANCES IN COMPUTATIONAL TECHNOLOGIES (NETACT), 2017, : 131 - 139